Bug In Sudo Let the Restricted Linux Users to Run Commands as Root

A new vulnerability has been discovered in the Linux Sudo program let unprivileged users can run the command as root by specifying the user ID -1 or 4294967295. Sudo (Superuser Do)...

9 Android Zero-day Vulnerabilities Affects Billions of Android Devices

Exclusive research found 9 critical system-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice calls, caller ID spoofing, unauthorized call operations, DOS attack, and...

Hacking WhatsApp with GIF Image

A vulnerability in WhatsApp has been discovered that can be used to compromise user chat sessions, files, and messages in other words WhatsApp can be hacked by just sending a...

10 Ways To Prevent Email Phishing Attacks

No one wants to believe they’d fall victim to phishing attacks. However, phishing attacks are on the rise and are more sophisticated than ever. There’s a good reason phishing attacks...

How Virtual Reality Can be the Future of Education

One of the major problems that students battle with is understanding very abstract parts of...

[Australian Cyber Conference 2019] Keynote

Top 10 ways to make hackers excited: All about the shortcuts not worth taking  Signing a secure architecture can always be more expensive, time-consuming, and complicated. But does it make sense...

A glimpse into the present state of security in robotics

 Download full report (PDF) The world of today continues its progress toward higher digitalization and mobility. From developments in the Internet of Things (IoT) through augmented reality to Industry 4.0, whichrely...

Buggy Malware Attack on WordPress Websites Exploiting New Bugs

Researchers discovered an ongoing buggy malware campaign that attempts to exploit the newly discovered vulnerabilities resides in the WordPress theme and plugin. Cybercriminals are always curious about developing the exploits soon...

as-a-Service – Crooks Sell Passwords on Hacking Forums

Threat actors advertising a new Combolists-as-a-Service model to sell credentials on the underground hacking forums that enable account takeovers. Attackers employ several methods to gain access to the account that...

LATEST NEWS

MUST READ